My first main idea
Because I will study Cyber Security my ideas will reflect in that way. Hence, I will look over what Cyber Security means and why it is important to have it as part of computing science. I did some research and I found many information about Cyber Security does mean: ''Cybersecurity is the protection of internet-connected systems, including hardware, software, and data, from cyberattacks. In a computing context, security comprises cybersecurity and physical security -- both are used by enterprises to protect against unauthorized access to data centers and other computerized systems.'' Rouser M, Gills A, and Clark C, Cybersecurity, 2019, 09.01.2020 <https://searchsecurity.techtarget.com/definition/cybersecurit>
I will focus on a large area to complete task 1 (essay) due to the wide range of domains that must be protected by attacks. In these days the technology is finding everywhere. We cannot conceive our life without technology, for example, a smartphone is used both to initiate a conversation, write a message or have a video conversation as well as on search information, keep a diary, make photos and video and many other things. Consequently, bad guys are prepared to attacks this kind of technology using methods such as hacking, phishing, scamming. ....
update: Saturday 11th of January I have been at Uni for Open Day. I take place for the presentation about my future course, and I have found cyberattacks not mean just the INTERNET, it can be in any device such as smart fridges, cars or smart houses. Attacks can take place anywhere and anytime and we must be prepared.
will continue .....
update 22.01.2020
The beginning is very hard due to much information, which can be found online. I will put myself some questions.
1. How to start cybercrime?
Due to my research, I found the first virus which attacked the PC/DOS was recorded in 1986, this kind of virus attacks the PC, via the DOS system it was made by two brethren Basit and Amjad Farook Alvi native from Pakistan. The name of the virus was called The Brain or The Pakistani Flu. this virus was harmless, no create massive destruction. Further, IBM created in 1987 the first antivirus software due to this virus. With the development of the internet, the virus becomes harmfull and hard to control. Kaspersky AO, 2020, A Brief History of Computer Viruses & What the Future Holds, Kaspersky, 22/01/2020, <https://www.kaspersky.co.uk/resource-center/threats/a-brief-history-of-computer-viruses-and-what-the-future-holds>
2. Who is behind these cyber attacks? Behind these attacks could be anybody, starts to youngest people, adults or could be an authority like a country or an organization.
3. How they take place?
I participated in a demonstration of an attack on DMU open day, Cyber Security department.
The demonstration has shown an attack over a process by using a computer. For the process, they have used a water pump to pump the water from a container in another using software to start the process. In the middle of the process, the scientist has sent an email that contains malware under a PDF format( usually a PDF is secure) which was download by the user into his computer, however, this kind of documents can be outsmarted and mislead our thinking. After the malware was downloaded, the attack took place and stoping the pump function.
4. How we can protect against them?
The first step is to have an antivirus subscription. Avoid opening unknown emails, folders or any other file.
Keep the browser update.
5. In the future, the number of attacks will increase?
After I did some research I found a title for my essay Combating cyberattacks. I will advise with my tutors if is the right title and I will write in another post.
I will focus on a large area to complete task 1 (essay) due to the wide range of domains that must be protected by attacks. In these days the technology is finding everywhere. We cannot conceive our life without technology, for example, a smartphone is used both to initiate a conversation, write a message or have a video conversation as well as on search information, keep a diary, make photos and video and many other things. Consequently, bad guys are prepared to attacks this kind of technology using methods such as hacking, phishing, scamming. ....
update: Saturday 11th of January I have been at Uni for Open Day. I take place for the presentation about my future course, and I have found cyberattacks not mean just the INTERNET, it can be in any device such as smart fridges, cars or smart houses. Attacks can take place anywhere and anytime and we must be prepared.
will continue .....
update 22.01.2020
The beginning is very hard due to much information, which can be found online. I will put myself some questions.
1. How to start cybercrime?
Due to my research, I found the first virus which attacked the PC/DOS was recorded in 1986, this kind of virus attacks the PC, via the DOS system it was made by two brethren Basit and Amjad Farook Alvi native from Pakistan. The name of the virus was called The Brain or The Pakistani Flu. this virus was harmless, no create massive destruction. Further, IBM created in 1987 the first antivirus software due to this virus. With the development of the internet, the virus becomes harmfull and hard to control. Kaspersky AO, 2020, A Brief History of Computer Viruses & What the Future Holds, Kaspersky, 22/01/2020, <https://www.kaspersky.co.uk/resource-center/threats/a-brief-history-of-computer-viruses-and-what-the-future-holds>
2. Who is behind these cyber attacks? Behind these attacks could be anybody, starts to youngest people, adults or could be an authority like a country or an organization.
3. How they take place?
I participated in a demonstration of an attack on DMU open day, Cyber Security department.
The demonstration has shown an attack over a process by using a computer. For the process, they have used a water pump to pump the water from a container in another using software to start the process. In the middle of the process, the scientist has sent an email that contains malware under a PDF format( usually a PDF is secure) which was download by the user into his computer, however, this kind of documents can be outsmarted and mislead our thinking. After the malware was downloaded, the attack took place and stoping the pump function.
4. How we can protect against them?
The first step is to have an antivirus subscription. Avoid opening unknown emails, folders or any other file.
Keep the browser update.
5. In the future, the number of attacks will increase?
After I did some research I found a title for my essay Combating cyberattacks. I will advise with my tutors if is the right title and I will write in another post.
The in-text citation is not quite right here, we can look at the correct format in class. You need to add the reference as well at the end of the post to link to the citation.
ReplyDeleteCan you increase the width of your blog as it is very narrow - this is done in the settings and customisation section of blogger.